An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the reason?
Which of the following methods limits access to a network based on characteristics of the network card?
Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?
A number of remote users have reported being unable to securely log on to the company’s network. Upon speaking with some of the employees experiencing the issue, no changes were made to their configurations, usernames, or passwords. The technician establishes a theory that one of the VPN concentrators may be down. Which of the following should the technician do NEXT?
Jeff, a company executive, has noticed that a wireless network signal from the company’s WAP can be seen in the company’s parking lot. Jeff is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?
Which of the following attack types is being used if the originating IP address has been spoofed?
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?
A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?